首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
ABSTRACT

I argue in this article that traditional just war theory did allow private, indeed even individual war, and that arguments in support of a legitimate authority criterion, let alone in support of the “priority” of this criterion, fail. I further argue that what motivates the insistence on “legitimate authority” is the assumption that doing away with this criterion will lead to chaos and anarchy. I demonstrate that the reasoning, if any, underlying this assumption is philosophically confused. The fact of the matter is that wars need not necessarily be authorized by some higher authority (such as a king, president, or parliament) in order to be justified, and this moral fact does not need to lead to chaos and anarchy. Accordingly, the criterion of legitimate authority cannot be relied on to delegitimate individual war, private war, guerrilla war, or even terrorism. Finally, I consider some other defenses of authorization and demonstrate that the “authorization” these accounts defend is either not needed for justification or already provided by other just war criteria or, indeed, entirely fictitious.  相似文献   

2.
In International Relations (IR), the actions of great powers are usually assessed through their direct effects. Great powers are generally considered to be responsible for the consequences of their actions if they intentionally caused them. Although there is discussion on “double-effects” and “side-effect harms” in the realms of philosophy and political sociology, these largely remain absent from the field of IR. This article bridges that gap by clarifying a set of yardsticks through which side-effect harms of great powers’ actions can be evaluated, including “capacity”, “historical precedent”, “voluntarism” and “unintentional causality”. These yardsticks are deduced through the Theory of Special Responsibilities, which combines elements of Constructivism and the English School. The theoretical framework presented is then applied to the case of American drone strikes in the Federally Administered Tribal Areas (FATA) of Pakistan. A number of terrorists in FATA have relocated elsewhere within Pakistan to escape these strikes, subsequently harming individuals in new locations. The article asks: who bears responsibility for the harm brought to civilians by these dislocated terrorists? Analysis from the perspective of the theoretical framework, constructed and applied here, suggests that even if the US may claim not to have directly intended such an outcome, it still shares some responsibility for the harm to innocent civilians.  相似文献   

3.
ABSTRACT

Discussion surrounding the announcement of a new NATO Maritime Command for the North Atlantic seems to have settled on the assumption that there is again a vital “sea-line of communication” (SLOC) between North America and Europe as there was supposed to be during the Cold War. The Soviet Union had a large fleet of nuclear and conventional submarines and it seemed very clear that Soviet admirals intended to fight a third “Battle of the Atlantic” in the event of war to prevent Western resupply of NATO. However, this scenario bore no resemblance to what the Soviet Navy actually intended to do in case of war. Changes in technology, notably in submarine propulsion, antisubmarine warfare (ASW), and ballistic missile range and accuracy were the real drivers of the Cold War in the Atlantic. Cruise missile-armed submarines that can attack shore-based economic infrastructure are the real threat from the Russian submarine force.  相似文献   

4.
EDITOR'S NOTE     
The Nonproliferation Review (NPR) recently interviewed Ambassador Sergio de Queiroz Duarte of Brazil, who presided over the 2005 Seventh Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Ambassador Duarte discussed his views on the outcome of the conference and the future of the treaty. He provided NPR with valuable insights into the outcome of the conference and also shared his thoughts on some of the most pressing issues confronting the NPT today, including the Middle East, nuclear terrorism, elimination of the threat of highly enriched uranium in the civilian nuclear sector, proposals to limit access to the nuclear fuel cycle, nuclear disarmament, and negative security assurances. Blaming the failed conference on a general lack of political commitment among states parties and their unwillingness to negotiate common solutions, Ambassador Duarte stressed that “the conference should face squarely its own failure without my attempting to disguise or sugarcoat the deep differences of view, which must be resolved with courage and determination by the states parties if they want the treaty to remain effective.”?He emphasized that if states fail to act on their overriding interest in upholding the NPT, especially if states parties continue to ignore or disregard their nonproliferation and nuclear disarmament obligations, some states might come to believe that their security interests are no longer served by the treaty. The future prospects of the NPT would then “look dire indeed.”  相似文献   

5.
信息化条件下的战争要求坦克具有网络化打击的能力,能自主完成威胁评估和火力分配任务。这些任务以获取敌方目标的火力指向、攻防状态等信息为前提,与姿态信息相关联,因此,研究坦克姿态估计技术意义重大。对现有的一些单目姿态估计方法进行分类;讨论了部分方法估计坦克姿态的可行性;阐述了坦克姿态估计存在的问题和难点;对姿态估计技术提出了建议,供后续的研究参考。  相似文献   

6.
ABSTRACT

Though it is legally permissible to kill combatants in war, unless they are rendered hors de combat, the existence of “Naked Soldiers” raises an important moral question: should combatants kill vulnerable enemy combatants or show mercy towards them? Most philosophers who address this question argue that it is morally permissible to kill the Naked Soldier given the extended notion of self-defense during war. They ground their arguments in a form of collectivism. In this article, I use Larry May’s argument. He offers an approach that extends the principle of discrimination that would apply also to combatants. Instead of assuming all combatants are de facto dangerous, this approach would allow for nuance in targeting the enemy and showing mercy when enemy combatants clearly pose no danger, in other words, when they are Naked Soldiers. I defend this view against two criticisms: Noam Zohar’s view of armies as complex collectives and Stephen Deakin’s view that a policy that spares Naked Soldiers would be open to abuse. I argue that it is not only morally suspect to kill Naked Soldiers, but also it is within the spirit of both international laws governing war and the just war tradition to offer mercy whenever possible.  相似文献   

7.
The use of commercial business management techniques is widespread in all government departments, including the Ministry of Defence. This article examines the use of popular management techniques in the Armed Forces and argues that their application is misplaced. It looks at what the “effs” – “efficiency” and “effectiveness” – mean in the business world and to the Armed Forces. It compares the definitions both in business and the Armed Forces and finds that there are few, if any, situations where the same measurements can be applied. Whilst many management techniques are suited for business, the function of the Armed Forces and its output cannot be measured in the same way, complicated by the different metrics of “efficiency” in peace and in war. This difference may not be clearly understood by some politicians, or indeed by some senior military personnel. Using examples from some of the most popular management techniques such as “Lean” and “Agile” it is possible to see that their use might actually diminish the capabilities of the Armed Forces when it comes to performing their principal role – the use of force to achieve political objectives.  相似文献   

8.
ABSTRACT

As the First World War came to an end, the U.S. Navy's leadership engaged in a bitter fight over the “lessons” of the war. Admiral William S. Sims and Secretary of the Navy Josephus Daniels fought against each other's irreconcilable positions. Sims argued that the Navy Department's inexpert civilian secretary had hamstrung mobilisation, impeded the anti-submarine campaign, and ostracised capable officers in favour of friends upon whom he bestowed medals. Daniels countered that his administration had masterfully responded to the crisis of war. The Navy's record, Daniels insisted, could best be summarised as “a great job greatly done.” Only disloyal nit-pickers could find fault in its accomplishments. The Sims-Daniels controversy raged in congressional hearings, the press, and in partisan histories written by the protagonists. The heart of the dispute and its uncertain resolution rested in radically different understandings of American civil–military relations, naval heroism, and the determinants of victory.  相似文献   

9.
International law clearly requires an imminent threat of attack as a justification for the preemptive use of military force. However, the standard definition of an imminent threat was derived centuries before the development of nuclear, chemical, or biological weapons or ballistic missiles and other delivery systems that can reach their targets in a matter of minutes. Any use of force to alleviate threats posed by weapons of mass destruction (WMD) prior to tactical warning of the actual launch of such weapons falls into the legally and ethically controversial category of “anticipatory self-defense,” leaving decision makers potentially liable to prosecution for war crimes. Effective and ethical enforcement of nonproliferation therefore demands a standard for imminence of threat broad enough to allow military action as a last resort but sufficiently restrictive to prohibit indiscriminate action against suspected WMD programs. Following a critical review of selected literature and cases on preemption, the author proposes a new standard for preemptive military action: the existence of operational WMD, or a clandestine program to develop WMD, in contravention of international law. The author discusses the implications of this new proposed standard, which at the time of writing would permit preemptive attack against WMD-armed terrorist groups but prohibit it against all states except Iran and possibly North Korea.  相似文献   

10.
It has frequently been observed in the literature on hybrid wars that there is a grey zone between peace and war, and that hybrid wars are conflicts which are not clear cases of war. In this paper, I attempt to illuminate this grey zone and the concept and nature of war from the philosophical discussions of vagueness and institutional facts. Vague terms are characterized by the fact that there is no non-arbitrary boundary between entities which lie in their extension, and entities which do not lie in their extension. I apply a theory of vagueness to notions such as “war” and “peace” and go on to suggest that the exact boundary for what counts as a war or not is arbitrary. However, the context in which the conflict occurs determines a range of possible locations for this boundary. The most important contextual parameter is in this respect how the parties to the conflict themselves conceptualize the conflict. I suggest that this can in various ways help us understand grey-zone conflicts.  相似文献   

11.
ABSTRACT

Today, it is widely held that while authorization may be helpful in assuring that the other jus ad bellum criteria are met, legitimate authority is not itself a condition for just recourse to war. Or, if it is necessary, it is said to be a trivial requirement, as mobilization for war requires some political authorization. Those who would retain the legitimacy requirement have differing views about who the proper authority is. I argue that, reasonably understood, legitimate authorization is necessary for jus ad bellum. Considerations of agency and consent in force combine with the social contract to commit us to deferring to recognized authorities. These obligations are strengthened by the epistemic reliability and pragmatic value conferred by governing institutions and procedures limiting recourse to war. These same rationales imply that the U.N. Security Council should regulate the international use of force. I qualify that if higher authorities fail to act, other subsidiary authorities may then authorize force. However, the move to each subsequent level of authorization must be justified. Understood in this way, the requirement that wars not be fought without legitimate authorization is a non-trivial, necessary procedural jus ad bellum condition.  相似文献   

12.
This paper examines the interaction between a growth-oriented terrorist organization and an uninformed government based on a two-period signalling game. Combining the signalling game and organizational growth approaches of previous contributions, this paper shows that, if a terrorist group follows a growth strategy, it has an incentive to appear weaker than it is by mimicking the behaviour of a smaller organization. Depending on its beliefs about the extent of the terrorist threat, it can be optimal for a government to spend more on second-period counter-terrorism measures if it is not attacked in the first period than if it were attacked.  相似文献   

13.
The peace treaty between Israel and Egypt has survived since 1979. Even so, following the events in Egypt, there is a growing tension between the two states, particularly surrounding the Sinai, which could cause a crisis and even a war. In such a case, the main battlefield would be in Sinai, and there would be several dominant aspects. Some of them would appear for the first time, compared with previous wars, such as a collision between Israeli and Egyptian units of around corps size. Other aspects would be more familiar, such as the ratio between the size of the forces to that of the battlefield, the “fog of war,” night fighting, “friendly fire” and deception.  相似文献   

14.
ABSTRACT

While many militaries have tried to capitalize on the potential of information operations in internal war, few have succeeded. I argue that military information campaigns fall short of expectations for two reasons. First, the theory of influence militaries generally embrace – communications as a non-lethal weapons system – is largely invalid. While treating information as a weapons system makes it easier to integrate it into the existing military planning system, this overstates the independent effects of communications on behavior and understates the importance of interactive effects of what commercial marketing theory refers to as the “marketing mix” – product, price, promotion, and placement. It would be more appropriate to treat military information operations as a form of marketing: a composite effort to induce a specific behavior in a target audience by applying a combination of material and ideational instruments. The marketing model suggests that the efficacy of information operations will depend not simply on the message and its delivery (promotion) but on the behavior the sender seeks to induce (the product), the costs of that behavior (the price), and the opportunities available for such behavior (the placement).  相似文献   

15.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

16.
What if claims about the future informed us about the intentions and the capabilities of our opponents to wage war against ourselves? Would and should the existing norms that restrict the preventive use of force change in the wake of such transformation? This article highlights the potential normative consequences of this change and discriminates between several possible normative evolutions. Would and should the “knowability of the future” alter radically the traditional rule of self-defense? This rule could indeed be jeopardized but, as I argue in this paper, it should not (and might not necessarily). However, the distinction between preemption and prevention could become obsolete. Future claims about security will also induce new security doctrines as knowledge about the future would be used to signal one’s intentions and deter one’s opponent. This change would also have a significant impact on accountability, as citizens would have a more active role in discussions over foreign policy. Moreover, new modes of predictions and forecasting will challenge the traditional role of experts whose biases have hampered their analyses and anticipations. Thus, trustworthy future claims could bring significant progress in both ethical and political terms as they would trigger a debate on the role of knowledge in democratic societies.  相似文献   

17.
ABSTRACT

While most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely.  相似文献   

18.
The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare.  相似文献   

19.
India and Pakistan are currently engaged in a competition for escalation dominance. While New Delhi is preparing for a limited conventional campaign against Pakistan, Islamabad is pursuing limited nuclear options to deter India. Together, these trends could increase the likelihood of nuclear conflict. India, for example, might conclude that it can launch an invasion without provoking a nuclear reprisal, while Pakistan might believe that it can employ nuclear weapons without triggering a nuclear exchange. Even if war can be avoided, these trends could eventually compel India to develop its own limited nuclear options in an effort to enhance deterrence and gain coercive leverage over Pakistan.  相似文献   

20.
States commonly take one of three approaches to militant groups on their soil: collaboration; benign neglect; or belligerence. All three approaches are present in Pakistan, where some groups also move back and forth among these categories. I employ the term “coopetition” to capture this fluidity. The dynamic nature of militancy in Pakistan makes the country an excellent laboratory for exploring a state’s assessment of the utility an Islamist militant group offers, and the threat it poses relative to other threats informs the state’s treatment of that group. In this article, I put forward a typology that situates Islamist militants in Pakistan in one of the above four categories. I also illustrate how a group’s identity, objectives, and alliances inform assessments of its utility and threat relative to other threats. In addition to enhancing our understanding of militant–state dynamics, this taxonomy builds on and helps to unify earlier typologies of Pakistani militancy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号